It can be used to verify which machines are running on a network, to find unused IP addresses from machines that are no longer around or to help in the organization and planning of network restructuring.